Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Local Self-Healing Machine Learning

v2.0.1

A fully local machine learning engine that makes your OpenClaw agent smart over time — without ever calling home, revealing your machine ID, or exposing any...

0· 280·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The stated purpose (local self-healing ML for the agent) matches many files (evolve, gep, ml, feedback, knowledge base). However there are surprising files and capabilities that don't cleanly match the 'no fingerprinting / no telemetry' promise: src/gep/deviceId.js and src/gep/envFingerprint.js exist (suggesting machine/environment identification), src/gep/hubSearch.js and skillDistiller imply external discovery/distillation flows, and scripts reference integrations (Feishu). These items are not justified by the SKILL.md claim that 'no machine ID' or 'no fingerprinting' occurs.
!
Instruction Scope
SKILL.md asserts 'zero network calls', but it documents optional Ollama integration and shows an example that runs a curl installer (curl https://ollama.com/install.sh | sh) and ollama pull — both are network operations initiated by user instructions. index.js and scripts use child_process/execSync/spawn, read .env and many local files (memory/, assets/), and the dashboard server exposes local data (including some env settings) via an API with CORS '*'. The code also includes an EVOLVE_ALLOW_SELF_MODIFY flag and mechanisms to solidify/evolve code, meaning the runtime can modify repository files when enabled — this deviates from the 'cannot modify itself or core configs' claim in SKILL.md (the doc claims protection but the option exists).
Install Mechanism
The skill has no install spec in the registry (instruction-only), but the package contains full source and scripts to run. The SKILL.md recommends installing Ollama via a one-liner that pipes curl to sh (high-risk practice) if the user wants embedding support. That optional installer is an external network action and a risky pattern even though it's not mandatory for the skill to run.
!
Credentials
Registry metadata declares no required env vars or credentials, but SKILL.md and code read many environment variables (EVOLVE_ALLOW_SELF_MODIFY, EVOLVE_STRATEGY, OLLAMA_URL/OLLAMA_EMBED_MODEL, LSHML_DASHBOARD_PORT, and several EVOLVER_*/EVOLVE_* runtime flags). The dashboard's gatherData exposes some environment values and the skill reads a .env file at startup (dotenv). More importantly, presence of envFingerprint.js and deviceId.js indicates the code may compute or store identifiers from the environment despite the 'no fingerprinting' claim — that is disproportionate to the claimed privacy guarantees.
!
Persistence & Privilege
The skill can run persistently as a daemon (--loop), writes a pid file, maintains persistent knowledge under memory/ and assets/gep/, and implements 'solidify' which writes genes, capsules, and events. There's an explicit EVOLVE_ALLOW_SELF_MODIFY toggle (default false) that suggests the engine can change its own source if enabled. While self-modification and persistent state are plausible for a self-healing system, they are high‑privilege actions and the skill's claim that 'cannot modify itself or core configs' is inconsistent with the existence of these mechanisms.
What to consider before installing
What to consider before installing or running this skill: - The SKILL.md promises 'no fingerprinting' and 'no telemetry', but the code includes files named deviceId.js and envFingerprint.js and other modules that likely collect environment/machine features. Ask the author for the contents of those files or inspect them yourself before trusting the claim. - The skill can modify files and has a self-modify toggle (EVOLVE_ALLOW_SELF_MODIFY). Keep that flag set to false unless you have audited the code and are comfortable allowing autonomous edits. Prefer running in single-run (--run) or review mode before enabling continuous loop. - The dashboard and tools read and serve local data (memory/, assets/), and the dashboard API returns some environment settings. Run the dashboard only on localhost and avoid exposing it to untrusted networks. Back up any important repository data before running solidify or evolution cycles. - The SKILL.md recommends installing Ollama via a curl | sh command. That installer and any pulled models are external network actions and should be treated as separate trust decisions — do not blindly run remote install scripts. - The code uses child_process/execSync/spawn, git log, and other shell interactions. Scripts can execute shell commands (and some scripts reference Feishu notification commands), so inspect scripts that call external commands before running them. - Suggested actions: (1) Review src/gep/deviceId.js, src/gep/envFingerprint.js, and src/gep/hubSearch.js to confirm they do not exfiltrate identifiers or call remote endpoints. (2) Run the skill in a tight sandbox or VM disconnected from sensitive networks and with least privilege. (3) Keep EVOLVE_ALLOW_SELF_MODIFY=false and review any proposed changes before applying (use --dry-run solidify). (4) If you need higher assurance, request a reproducible build or an explanation from the author about how 'no telemetry' is implemented and audited. If you want, I can: (a) summarize suspicious files and where they are used, (b) search the repository for network-sending code or hard-coded endpoints, or (c) walk through specific files (deviceId.js, envFingerprint.js, skillDistiller) and explain exactly what they do.
index.js:164
Shell command execution detected (child_process).
scripts/generate_history.js:17
Shell command execution detected (child_process).
scripts/suggest_version.js:27
Shell command execution detected (child_process).
src/evolve.js:278
Shell command execution detected (child_process).
src/gep/solidify.js:72
Shell command execution detected (child_process).
src/ops/self_repair.js:17
Shell command execution detected (child_process).
src/ops/skills_monitor.js:96
Shell command execution detected (child_process).
src/evolve.js:55
Environment variable access combined with network send.
src/gep/a2aProtocol.js:24
Environment variable access combined with network send.
src/ml/embeddings.js:13
Environment variable access combined with network send.
src/ops/self_repair.js:45
Environment variable access combined with network send.
!
src/evolve.js:359
File read combined with network send (possible exfiltration).
!
src/gep/a2aProtocol.js:117
File read combined with network send (possible exfiltration).
!
src/ml/embeddings.js:31
File read combined with network send (possible exfiltration).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

aivk970xgbqqae9nm2aktg0r7taxn82rn5vembeddingsvk970xgbqqae9nm2aktg0r7taxn82rn5vlatestvk970xgbqqae9nm2aktg0r7taxn82rn5vlocalvk970xgbqqae9nm2aktg0r7taxn82rn5vmachine-learningvk970xgbqqae9nm2aktg0r7taxn82rn5vself-healingvk970xgbqqae9nm2aktg0r7taxn82rn5v

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments